Philip Ginzboorg

Orcid: 0000-0003-4579-3668

According to our database1, Philip Ginzboorg authored at least 32 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Attestation with Constrained Relying Party.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Privacy-Enhanced AKMA for Multi-Access Edge Computing Mobility.
Comput., January, 2023

2022
Privacy-Aware Access Protocols for MEC Applications in 5G.
Network, 2022

Trusted Hart for Mobile RISC-V Security.
Proceedings of the IEEE International Conference on Trust, 2022

AKMA for Secure Multi-access Edge Computing Mobility in 5G.
Proceedings of the Computational Science and Its Applications - ICCSA 2022 Workshops, 2022

2021
AKMA: Delegated Authentication System of 5G.
IEEE Commun. Stand. Mag., 2021

Credential Provisioning and Device Configuration with EAP.
Proceedings of the MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, Alicante, Spain, November 22, 2021

Privacy-Preserving Access for Multi-Access Edge Computing (MEC) Applications.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

2019
Privacy Preserving AKMA in 5G.
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019

AKMA Support in Multi SIM User Equipment.
Proceedings of the 25th Conference of Open Innovations Association, 2019

2018
Estimating Message Transmission Time Over Heterogeneous Disrupted Links.
Proceedings of the 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2018

Defeating the Downgrade Attack on Identity Privacy in 5G.
Proceedings of the Security Standardisation Research - 4th International Conference, 2018

2017
On estimating the alphabet size of a discrete random source.
CoRR, 2017

On De-synchronization of User Pseudonyms in Mobile Networks.
Proceedings of the Information Systems Security - 13th International Conference, 2017

2016
Privacy of the long-term identities in cellular networks.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

2015
From the rigid hierarchical to flexible flow-based 5G architecture: Dimensioning issues.
Proceedings of the 6th International Conference on the Network of the Future, 2015

2014
Message fragmentation for a chain of disrupted links.
Comput. Commun., 2014

2013
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks.
Mob. Networks Appl., 2013

Fragmentation algorithms for DTN links.
Comput. Commun., 2013

Inferring social ties in academic networks using short-range wireless communications.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Inferring social ties in pervasive networks: an on-campus comparative study.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

2012
Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks.
Proceedings of the Pervasive Computing - 10th International Conference, 2012

Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Best-effort authentication for opportunistic networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Message Fragmentation for Disrupted Links.
Proceedings of the European Wireless 2011, April 27-29, 2011, Vienna, Austria., 2011

2010
Reachability in Restricted Walk on Integers.
J. Univers. Comput. Sci., 2010

Controlling resource hogs in mobile delay-tolerant networks.
Comput. Commun., 2010

2007
Applicability of identity-based cryptography for disruption-tolerant networking.
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007

2005
Visitor Access Management in Personal Wireless Networks.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

2004
Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

2000
Key agreement in ad hoc networks.
Comput. Commun., 2000

Seven comments on charging and billing.
Commun. ACM, 2000


  Loading...